AntiVirus Warning

Written by Dawn Gray

It is a sad day whenrepparttar antivirus software messes up your computer more thanrepparttar 132128 @#$& virus you got in yesterday's email. The more complex antivirus software gets,repparttar 132129 more it becomes like a virus itself. In honor of my recent discovery of a new problem with my antivirus program, here are a few pitfalls of popular (and not so popular) programs:

1. "Norton Crash Guard crashes my computer."

This isrepparttar 132130 first problem I noticed with Symantec's popular suite of computer protective software. Norton Crash Guard immediately forced my brother's new Compaq computer even with errors that would normally just shut downrepparttar 132131 program involved. (That was justrepparttar 132132 worse case.)

On other computers, loading Crash Guard slowed downrepparttar 132133 computer so much I felt compelled to take it off.

2. "Norton AntiVirus is keeping me from accessingrepparttar 132134 internet."

When I first installed Norton AntiVirus, I had to call our internet service provider AND Eudora in order to access email again. It turns outrepparttar 132135 program tries to route all email through their server to check for viruses. You have to go into your preferences and reset them in a way that will work with your internet service provider.

I'm notrepparttar 132136 only one, either! I recently received a message from a direct mail guru who said he was offline for almost 12 hours because he loaded Norton AntiVirus to delete a virus he inadvertently picked up from an email message.

3. "Norton Systemworks is slowing down my computer."

My Dad recently took a computer in because it was having some problems. The technician told him they recommended everyone uninstallrepparttar 132137 Norton Systemworks computer monitor (the little window that tells you how much your drive is fragmented, how much of your CPU you're using, etc.).

How to fight Cyberterrorism

Written by Godfrey Heron

Information Technology isrepparttar lifeline of most organizations today, and as such a disrupted information system can cause your company to lose market share and eventually bring it to its knees. 94% of companies without a tested crisis plan go out of business after a severe loss of service for two weeks or more. We are so bound as a global community that a disaster in a single major city results in significant ripple effects aroundrepparttar 132127 world.

Cyberterrorism, weather direct or indirect, is an issue all businesses should anticipate and arrange for backup plans. Depending onrepparttar 132128 size ofrepparttar 132129 company, backups ofrepparttar 132130 backup plan may need to be considered.

Politically charged events frequently unleash a nest of virus', worms and Trojan horses onrepparttar 132131 Internet, and with increasing intensity. In one day,repparttar 132132 current Nimda virus generated one hundred timesrepparttar 132133 traffic thatrepparttar 132134 code red virus took three days to do.

A group setup byrepparttar 132135 federal government to counter Cyberterrorism released a report stating that "A personal computer and a simple telephone connection to an Internet service provider anywhere inrepparttar 132136 world are enough to cause a great deal of harm. The right command sent over a network to a power generating station's control computer could be just as effective as a backpack full of explosives, andrepparttar 132137 perpetrator would be harder to identify and apprehend."

To protect your business inrepparttar 132138 event of a disaster you need to identifyrepparttar 132139 mission critical information streams that need to be protected. This may include both print material and computer hardware and software.


Minimizingrepparttar 132140 loss of valuable documents or data can be accomplished quite easily by performing regularly scheduled backups. It is absolutely essential that OFF-SITE copies of backups be kept. This will assure quick recovery from disasters.

Backups may be done using a variety of medias, such as, floppy disks , zip disks, re-writeable cd's, and removable hard drives. The type of media you use will depend onrepparttar 132141 quantity of data being stored.

Larger companies may also consider installing "mirror" servers, which allowrepparttar 132142 same real time information being kept in different locations. Consideration should also be given to outsourcing applications to ASPs (Application Service Providers) which have mirrored data centers.

Any paper documents which are considered critical should also be backed up withrepparttar 132143 help of a scanner and stored off-site. Myriads of paper documents were strewn all over New York followingrepparttar 132144 WTC disaster. Many ofrepparttar 132145 organizations and companies affected have no idea of what they have lost or even how to recover missing files. Some of which have irreplaceable information and signatures.


A good anti-virus software is essential in your counter terrorism arsenal. It will offer continuous protection and automatically scans all file inputs, outputs, downloads, program executions, and other system-related activities to help prevent virus penetration. If a virus is discovered, you will haverepparttar 132146 option to clean or deleterepparttar 132147 infected file.

Cont'd on page 2 ==> © 2005
Terms of Use